This paper presents the design and architecture of an integrated environment that provides location independent and mobile access to Intelligent Domotic Environments. The envision...
The modeling of the human visual attention into a computational attention model leads to the split of visual features into several independent channels. Then, a difficult problem ...
Christel Chamaret, Jean-Claude Chevet, Olivier Le ...
This paper presents an experimental power angle profile measurement procedure, as well as theoretical capacity results of a single-input-multiple-output (SIMO) system which operate...
Nektarios Moraitis, Philip Constantinou, Demosthen...
In this demo, we present an application for mobile phones which can monitor physical activities of users and detect unexpected emergency situations such as a sudden fall or accide...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...